To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
There was a problem filtering reviews right now. Please try again later.
There are 0 reviews and 0 ratings from Australiawith 4 star
From other countries
TOP 500 REVIEWER
4.0 out of 5 starsDarker than you think
Reviewed in the United Kingdom on 6 August 2014
This is an interesting book, it has a contents, concise index and chapters are laid out well with good use of headings and subheadings and summations at the end of each chapter, there are supporting pictures and while there is the deployment of some technical jargon the pace is fine.
The book essentially a guide to non-verbal communication, elicitation, building rapport etc. with a view to social engineering, ie information gathering, pretexting, rapport, influence/manipulation, framing etc. It is very good in description of the processes commonly involved and the prescriptive side of the story is one of raising awareness about these processes for the purposes of improved security, it doesnt matter how many data protection and other measures there exist for someone personally and professionally if the human element isnt right its easy to "accidentially" reveal all that someone with malintent will need to transcend them all.
The question remains as to whether or not this book is illuminating enough to justify its expense, surely everyone possesses some level of awareness or insight into others to recognise when someone's behaviour appears manipulative, when they ask more questions than they ever provide disclosures, when they disclosures have a phony quality and simply mirror the context or the other with whom they are interacting and the a myriad of minor slips add up to something more like an indication of bad character.
There probably are varying degrees of wariness and perhaps some readers will be approaching books like this "after the horse has bolted", ie when their existing level of wariness as proven inadequate and they are questioning why, or perhaps its nothing which has happened to them personally but they have reflected upon headlines in the news about how routinely business and other services have been infiltrated by individuals who are willing to abuse positions of trust.
There is definitely content here which will refine any existing insight a reader possesses and it is not commonsensical material sold as something special. The book did make me think of a collection of slides or material built up over time through presenations, training resources and public speaking, both a strength and a weakness in some ways, so while as a reader you may at times feel this would all suit another method of delivery better, ie a talk, it also permits a lot of concision and if you want further information its possible to look elsewhere for more detail.
One thing I would note is a point about style, the author writes a style which is familiar to me from certain US business and management writers which can occasionally emulate something of a "bad novel" in style, like someone is writing for a presentation and it would suit that well but not so much a book. This is of course my opinion and maybe not shared by many, it is a minor quibble about what is overall a fine book. I would recommend this to as wide a readership as possible, the general reader aswell as the professional, I believe it is intended for such a readership and could provide some assurities against being scammed or targetted by the skilled manipulator.
As the author points out several times in the text, the information and research that went into this book isn't new. This doesn't mean that the book doesn't add anything new to the discussion, but simply that a lot of the first half of the book will be review for you if you're already familiar with the research of people like Dr. Paul Ekman and Joseph Navarro. If you haven't already studied body language, nonverbal communication and micro expressions, then this book will be an excellent introduction for you.
The second half of the book moves into the domain of social engineering, discussing how to use the methods described earlier to perform penetration tests and spot social engineers and con artists before they're able to do real damage. This part of the book is what makes Christopher Hadnagy's work valuable to people in law enforcement and the Intelligence Community.
In the end, Chris's book will leave you hungry for more information and eager to practice the skills that the book discusses. The book also provides you with several excellent resources for those people interested in continuing to learn about social engineering, body language and micro expressions.
This book was OK. I did learn about people's body language and some about SI. I can't help to say that there was in my opinion too much promotion for the Dr. he speaks of in this book. Christopher tried really hard to make himself synonymous with the man. The entire book looks completely aimed at doing just that. It's like "Hey look at me and 'Dr SoSo', we're e a Team"
The book covers a wide array of topics including nonverbal communications, decoding body language, deciphering the science behind it all and then how to put it all together. Hadnagy seems to have taken the extra efforts to make sure that everything in the book is grounded in hard science (and it shows). Each chapter is sprinkled with real life examples of the topics with what worked and what failed on that engagement. The information is not just about body language and how to decode it; it is applied directly to the art of social engineering! The Bad:
I have read most of the books that were referenced in this book, which made some of the underlining science a bit boring and mostly review. This isn’t really bad; perhaps more of a heads up than anything else.
This book is written in such a way that it’s an easy read from end to end as well as a great reference book on the subject. I would recommend this book to anyone interested in social engineering. This is a must read for anyone starting out to the seasoned pros.